From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks., , , и . WISA, том 11402 из Lecture Notes in Computer Science, стр. 42-54. Springer, (2018)Adversarial attacks by attaching noise markers on the face against deep face recognition., , и . J. Inf. Secur. Appl., (2021)New Security Paradigm for Application Security Infrastructure., , , и . ICOIN, том 2662 из Lecture Notes in Computer Science, стр. 793-802. Springer, (2003)Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network., , и . WISA, том 10763 из Lecture Notes in Computer Science, стр. 297-309. Springer, (2017)Customer Data Scanner for Hands-Free Mobile Payment., , , , , и . IEICE Trans. Commun., 98-B (11): 2291-2299 (2015)Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol., и . IEEE Access, (2018)A hybrid adversarial training for deep learning model and denoising network resistant to adversarial examples., и . Appl. Intell., 53 (8): 9174-9187 (апреля 2023)Performance Comparison and Visualization of AI-Generated-Image Detection Methods., , и . IEEE Access, (2024)POSTER: Address Authentication Based on Location History., , , и . AsiaCCS, стр. 845-847. ACM, (2018)Simplified small exponent test for batch verification., , , , , и . Theor. Comput. Sci., (2017)